Page 1 of 3 123 LastLast
Results 1 to 10 of 23

Thread: HIJackThis won't run

  1. #1
    Junior Member
    Join Date
    Jul 2006
    Posts
    19

    Unhappy HIJackThis won't run

    Hello,

    I know that I am infected. I have gone through all the steps on the instructions but whenever I run hijack this the program freezes when it gets to 015 secure zone. I'm not sure what to do. S&D comes up clear. However sexlist keeps popping up. I ran avast! it found some trojan horses and stuff. But since I cannot run HiJack this, I don't have a log to post.

    Please help. Thanks,

  2. #2
    In Memoriam -Always in our heart pskelley's Avatar
    Join Date
    Oct 2005
    Location
    Clearwater, Florida
    Posts
    20,247

    Default

    Welcome to the forum, I need that HJT log. Sometimes it will appear to be freezing so allow more time to make sure it does not finish. If it does not, then run ewido according to the instructions I am about to post. Delete anything ewido locates unless you know it is not bad. Once ewido clean out some of the junk, then try HJT again.

    ewido scan:
    First download ewido anti-spyware from HERE and save that file to your desktop.
    This is a 30 day trial of the program
    1. Once you have downloaded ewido anti-spyware, locate the icon on the desktop and double-click it to launch the set up program.
    2. Once the setup is complete you will need run ewido and update the definition files.
    3. On the main screen select the icon "Update" then select the "Update now" link.
      • Next select the "Start Update" button, the update will start and a progress bar will show the updates being installed.
    4. Once the update has completed select the "Scanner" icon at the top of the screen, then select the "Settings" tab.
    5. Once in the Settings screen click on "Recommended actions" and then select "Quarantine".
    6. Under "Reports"
      • Select "Automatically generate report after every scan"
      • Un-Select "Only if threats were found"
    Close ewido anti-spyware, Do Not run a scan just yet, we will shortly.
    1. Reboot your computer into SafeMode. You can do this by restarting your computer and continually tapping the F8 key until a menu appears. Use your up arrow key to highlight SafeMode then hit enter.
      IMPORTANT: Do not open any other windows or programs while ewido is scanning, it may interfere with the scanning proccess:
    2. Lauch ewido-anti-spyware by double-clicking the icon on your desktop.
    3. Select the "Scanner" icon at the top and then the "Scan" tab then click on "Complete System Scan".
    4. ewido will now begin the scanning process, be patient this may take a little time.
      Once the scan is complete do the following:
    5. If you have any infections you will prompted, then select "Apply all actions"
    6. Next select the "Reports" icon at the top.
    7. Select the "Save report as" button in the lower left hand of the screen and save it to a text file on your system (make sure to remember where you saved that file, this is important).
    8. Close ewido and reboot your system back into Normal Mode and post the results of the ewido report scan.


    Post the ewido scan results and the HJT log. Let me know what symptoms are still showing at this point, including error messages "word for word".

    Thanks

  3. #3
    Junior Member
    Join Date
    Jul 2006
    Posts
    19

    Unhappy I don't Have Win 2000

    I use windows 98. It says I need 2000 to download the program. Is there another program that I can use? Also, my avast shows that I have this thing called Ecru that is trying to install a BHO and a trojan horse called
    c:\windows\wtet\wuauclt.exe\[UPX]
    Win32:Purityscan-Q [Trj]
    0637-2, 09/15/2006

    I have had several attempts to run HiJack This however it still crashes at Zone 15 trusted content. I think that is what it is called.

    Please help :(

  4. #4
    In Memoriam -Always in our heart pskelley's Avatar
    Join Date
    Oct 2005
    Location
    Clearwater, Florida
    Posts
    20,247

    Default

    I apologize, I had no way of knowing what the operating system was. I need to see a HJT log, I will post a few online scans that may run with your Operating System. Most of the new tools will not run on it. Since you mention Purity Scan, you can try this:

    Start > Control Panel > Add Remove programs. Uninstall anything that looks like this: PuritySCAN By OIN, OIN or OuterInfo. If you see nothing there, then download and run this uninstaller: http://www.outerinfo.com/howto.html
    If you see any other programs you know do not belong, uninstall them also. If you are unsure, let me know and I will look.

    That may get rid of PurityScan adware, but I have never know it to block HJT. I am going to suggest you delete all of HJT you have onboard and download it again. Open your C:\ and make a folder called HJT. Download from here: http://www.merijn.org/files/HijackThis.exe choose to "SAVE" the file then direct it to that folder you created. Then give it another try.

    Here are a few scanners that may or may not run on Windows 98
    http://housecall.trendmicro.com/
    http://www.kaspersky.com/scanforvirus.html
    http://www.windowsecurity.com/trojanscan/
    Thanks
    Last edited by pskelley; 2006-09-16 at 01:19.

  5. #5
    Junior Member
    Join Date
    Jul 2006
    Posts
    19

    Default I also have this thing called Uker

    I am working on using Kapersky. HJT still is not working. Neither does trend micro. I'm not sure if this list will work. I got it off of panda scan and adaware.


    Incident Status Location

    Spyware:Cookie/Zedo Not disinfected C:\WINDOWS\Cookies\valued sony customer@c5.zedo[1].txt
    Spyware:Cookie/BurstBeacon Not disinfected C:\WINDOWS\Cookies\valued sony customer@www.burstbeacon[1].txt
    Spyware:Cookie/Apmebf Not disinfected C:\WINDOWS\Cookies\valued sony customer@apmebf[2].txt
    Spyware:Cookie/PointRoll Not disinfected C:\WINDOWS\Cookies\valued sony customer@ads.pointroll[2].txt
    Adware:Adware/PurityScan Not disinfected C:\WINDOWS\wtet\wuauclt.exe


    AdaWare Log


    Ad-Aware SE Build 1.06r1
    Logfile Created on:Sunday, September 10, 2006 8:59:49 PM
    Created with Ad-Aware SE Personal, free for private use.
    Using definitions file:SE1R121 28.08.2006
    »»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»

    References detected during the scan:
    »»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»
    MRU List(TAC index:0):27 total references
    Possible Browser Hijack attempt(TAC index:3):3 total references
    Tracking Cookie(TAC index:3):10 total references
    »»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»

    Ad-Aware SE Settings
    ===========================
    Set : Search for negligible risk entries
    Set : Safe mode (always request confirmation)
    Set : Scan active processes
    Set : Scan registry
    Set : Deep-scan registry
    Set : Scan my IE Favorites for banned URLs
    Set : Scan my Hosts file

    Extended Ad-Aware SE Settings
    ===========================
    Set : Unload recognized processes & modules during scan
    Set : Scan registry for all users instead of current user only
    Set : Always try to unload modules before deletion
    Set : Let Windows remove files in use at next reboot
    Set : Delete quarantined objects after restoring
    Set : Include basic Ad-Aware settings in log file
    Set : Include additional Ad-Aware settings in log file
    Set : Include reference summary in log file
    Set : Include alternate data stream details in log file
    Set : Play sound at scan completion if scan locates critical objects


    9-10-06 8:59:49 PM - Scan started. (Full System Scan)

    MRU List Object Recognized!
    Location: : C:\WINDOWS\Application Data\microsoft\office\recent
    Description : list of recently opened documents using microsoft office


    MRU List Object Recognized!
    Location: : .DEFAULT\software\adobe\acrobat reader\6.0\avgeneral\crecentfiles
    Description : list of recently used files in adobe reader


    MRU List Object Recognized!
    Location: : software\microsoft\direct3d\mostrecentapplication
    Description : most recent application to use microsoft direct3d


    MRU List Object Recognized!
    Location: : software\microsoft\direct3d\mostrecentapplication
    Description : most recent application to use microsoft direct X


    MRU List Object Recognized!
    Location: : software\microsoft\directdraw\mostrecentapplication
    Description : most recent application to use microsoft directdraw


    MRU List Object Recognized!
    Location: : .DEFAULT\software\microsoft\internet explorer
    Description : last download directory used in microsoft internet explorer


    MRU List Object Recognized!
    Location: : .DEFAULT\software\microsoft\internet explorer\main
    Description : last save directory used in microsoft internet explorer


    MRU List Object Recognized!
    Location: : .DEFAULT\software\microsoft\internet explorer\typedurls
    Description : list of recently entered addresses in microsoft internet explorer


    MRU List Object Recognized!
    Location: : .DEFAULT\software\microsoft\mediaplayer\player\recentfilelist
    Description : list of recently used files in microsoft windows media player


    MRU List Object Recognized!
    Location: : .DEFAULT\software\microsoft\mediaplayer\player\recenturllist
    Description : list of recently used web addresses in microsoft windows media player


    MRU List Object Recognized!
    Location: : .DEFAULT\software\microsoft\mediaplayer\player\settings
    Description : last open directory used in jasc paint shop pro


    MRU List Object Recognized!
    Location: : .DEFAULT\software\microsoft\mediaplayer\preferences
    Description : last cd record path used in microsoft windows media player


    MRU List Object Recognized!
    Location: : .DEFAULT\software\microsoft\mediaplayer\preferences
    Description : last playlist index loaded in microsoft windows media player


    MRU List Object Recognized!
    Location: : .DEFAULT\software\microsoft\mediaplayer\preferences
    Description : last playlist loaded in microsoft windows media player


    MRU List Object Recognized!
    Location: : .DEFAULT\software\microsoft\office\10.0\common\open find\microsoft powerpoint\settings\save as\file name mru
    Description : list of recent documents saved by microsoft powerpoint


    MRU List Object Recognized!
    Location: : .DEFAULT\software\microsoft\office\10.0\common\open find\microsoft word\settings\open\file name mru
    Description : list of recent documents opened by microsoft word


    MRU List Object Recognized!
    Location: : .DEFAULT\software\microsoft\office\10.0\common\open find\microsoft word\settings\save as\file name mru
    Description : list of recent documents saved by microsoft word


    MRU List Object Recognized!
    Location: : .DEFAULT\software\microsoft\office\10.0\excel\recent files
    Description : list of recent files used by microsoft excel


    MRU List Object Recognized!
    Location: : .DEFAULT\software\microsoft\office\10.0\powerpoint\recent file list
    Description : list of recent files used by microsoft powerpoint


    MRU List Object Recognized!
    Location: : .DEFAULT\software\microsoft\office\10.0\word\recent templates
    Description : list of recent templates used by microsoft word


    MRU List Object Recognized!
    Location: : .DEFAULT\software\microsoft\windows\currentversion\explorer\doc find spec mru
    Description : list of recently used search terms for locating files using the microsoft windows operating system


    MRU List Object Recognized!
    Location: : .DEFAULT\software\nico mak computing\winzip\filemenu
    Description : winzip recently used archives


    MRU List Object Recognized!
    Location: : .DEFAULT\software\realnetworks\realplayer\6.0\preferences
    Description : list of recent skins in realplayer


    MRU List Object Recognized!
    Location: : .DEFAULT\software\realnetworks\realplayer\6.0\preferences
    Description : list of recent clips in realplayer


    MRU List Object Recognized!
    Location: : .DEFAULT\software\realnetworks\realplayer\6.0\preferences
    Description : list of recent open locations in realplayer


    MRU List Object Recognized!
    Location: : .DEFAULT\software\realnetworks\realplayer\6.0\preferences
    Description : last login time in realplayer


    MRU List Object Recognized!
    Location: : .DEFAULT\software\microsoft\windows media\wmsdk\general
    Description : windows media sdk


    Listing running processes
    »»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»

    #:1 [KERNEL32.DLL]
    FilePath : C:\WINDOWS\SYSTEM\
    ProcessID : 4279188633
    Threads : 4
    Priority : High
    FileVersion : 4.10.2222
    ProductVersion : 4.10.2222
    ProductName : Microsoft(R) Windows(R) Operating System
    CompanyName : Microsoft Corporation
    FileDescription : Win32 Kernel core component
    InternalName : KERNEL32
    LegalCopyright : Copyright (C) Microsoft Corp. 1991-1999
    OriginalFilename : KERNEL32.DLL

    #:2 [MPREXE.EXE]
    FilePath : C:\WINDOWS\SYSTEM\
    ProcessID : 4294933581
    Threads : 1
    Priority : Normal
    FileVersion : 4.10.1998
    ProductVersion : 4.10.1998
    ProductName : Microsoft(R) Windows(R) Operating System
    CompanyName : Microsoft Corporation
    FileDescription : WIN32 Network Interface Service Process
    InternalName : MPREXE
    LegalCopyright : Copyright (C) Microsoft Corp. 1993-1998
    OriginalFilename : MPREXE.EXE

    #:3 [mmtask.tsk]
    FilePath : C:\WINDOWS\SYSTEM\
    ProcessID : 4294873753
    Threads : 1
    Priority : Normal
    FileVersion : 4.03.1998
    ProductVersion : 4.03.1998
    ProductName : Microsoft Windows
    CompanyName : Microsoft Corporation
    FileDescription : Multimedia background task support module
    InternalName : mmtask.tsk
    LegalCopyright : Copyright © Microsoft Corp. 1991-1998
    OriginalFilename : mmtask.tsk

    #:4 [MSTASK.EXE]
    FilePath : C:\WINDOWS\SYSTEM\
    ProcessID : 4294897161
    Threads : 2
    Priority : Normal
    FileVersion : 4.71.1972.1
    ProductVersion : 4.71.1972.1
    ProductName : Microsoft® Windows® Task Scheduler
    CompanyName : Microsoft Corporation
    FileDescription : Task Scheduler Engine
    InternalName : TaskScheduler
    LegalCopyright : Copyright (C) Microsoft Corp. 2000
    OriginalFilename : mstask.exe

    #:5 [BAYSWAP.EXE]
    FilePath : C:\PROGRAM FILES\POWERPANEL\BAYSWAP\
    ProcessID : 4294924789
    Threads : 2
    Priority : Normal
    FileVersion : 1.1.2
    ProductVersion : 1.1.2
    ProductName : Phoenix BaySwap
    CompanyName : Phoenix Technologies, Ltd.
    FileDescription : BaySwap Application Program
    InternalName : BaySwap.EXE
    LegalCopyright : (C) 1998-1999 Phoenix Technologies Ltd.
    OriginalFilename : BaySwap.EXE

    #:6 [BWSVC.EXE]
    FilePath : C:\PROGRAM FILES\BUFFALO\CLIENT MANAGER 2\
    ProcessID : 4294894317
    Threads : 10
    Priority : Normal
    FileVersion : 1, 0, 2, 2
    ProductVersion : 1, 0, 2, 2
    ProductName : BUFFALO Wireless Service
    CompanyName : BUFFALO INC.
    FileDescription : BUFFALO Wireless Service
    InternalName : BWSVC
    LegalCopyright : Copyright (C) 2004
    OriginalFilename : BWSVC.EXE

    #:7 [ASHSERV.EXE]
    FilePath : C:\PROGRAM FILES\ALWIL SOFTWARE\AVAST4\
    ProcessID : 4294849349
    Threads : 20
    Priority : Normal
    FileVersion : 4, 7, 844, 0
    ProductVersion : 4, 7, 0, 0
    ProductName : avast! Antivirus
    FileDescription : avast! antivirus service
    InternalName : aswServ
    LegalCopyright : Copyright (c) 2006 ALWIL Software
    OriginalFilename : aswServ.exe

    #:8 [EXPLORER.EXE]
    FilePath : C:\WINDOWS\
    ProcessID : 4294784273
    Threads : 15
    Priority : Normal
    FileVersion : 4.72.3110.1
    ProductVersion : 4.72.3110.1
    ProductName : Microsoft(R) Windows NT(R) Operating System
    CompanyName : Microsoft Corporation
    FileDescription : Windows Explorer
    InternalName : explorer
    LegalCopyright : Copyright (C) Microsoft Corp. 1981-1997
    OriginalFilename : EXPLORER.EXE

    #:9 [RPCSS.EXE]
    FilePath : C:\WINDOWS\SYSTEM\
    ProcessID : 4294707169
    Threads : 5
    Priority : Normal
    FileVersion : 4.71.2900
    ProductVersion : 4.71.2900
    ProductName : Microsoft(R) Windows NT(TM) Operating System
    CompanyName : Microsoft Corporation
    FileDescription : Distributed COM Services
    InternalName : rpcss.exe
    LegalCopyright : Copyright (C) Microsoft Corp. 1981-1998
    OriginalFilename : rpcss.exe

    #:10 [TASKMON.EXE]
    FilePath : C:\WINDOWS\
    ProcessID : 4294733933
    Threads : 1
    Priority : Normal
    FileVersion : 4.10.1998
    ProductVersion : 4.10.1998
    ProductName : Microsoft(R) Windows(R) Operating System
    CompanyName : Microsoft Corporation
    FileDescription : Task Monitor
    InternalName : TaskMon
    LegalCopyright : Copyright (C) Microsoft Corp. 1998
    OriginalFilename : TASKMON.EXE

    #:11 [SYSTRAY.EXE]
    FilePath : C:\WINDOWS\SYSTEM\
    ProcessID : 4294723129
    Threads : 2
    Priority : Normal
    FileVersion : 4.10.2222
    ProductVersion : 4.10.2222
    ProductName : Microsoft(R) Windows(R) Operating System
    CompanyName : Microsoft Corporation
    FileDescription : System Tray Applet
    InternalName : SYSTRAY
    LegalCopyright : Copyright (C) Microsoft Corp. 1993-1998
    OriginalFilename : SYSTRAY.EXE

  6. #6
    Junior Member
    Join Date
    Jul 2006
    Posts
    19

    Default Here is the rest of it....

    #:12 [DSLAUNCH.EXE]
    FilePath : C:\WINDOWS\
    ProcessID : 4294703993
    Threads : 1
    Priority : Normal
    FileVersion : 4.00.2006
    ProductVersion : 4.00.2006
    ProductName : YAMAHA DS-XG Application
    CompanyName : YAMAHA Corporation
    FileDescription : YAMAHA DS-XG Launcher
    InternalName : YAMAHA DS-XG Launcher
    LegalCopyright : Copyright (c) YAMAHA Corp. 1999
    OriginalFilename : dslaunch.exe
    Comments : YAMAHA DS-XG Launcher

    #:13 [HKSERV.EXE]
    FilePath : C:\PROGRAM FILES\SONY\HOTKEY UTILITY\
    ProcessID : 4294693129
    Threads : 2
    Priority : Normal
    FileVersion : Version 1.18_su.3030
    ProductVersion : Version 1.18_su.3030
    ProductName : Hot Key Server executable file
    CompanyName : Sony Corporation
    FileDescription : Hot Key Server EXE
    InternalName : HotKeyServ
    LegalCopyright : Copyright 1998 - 2000 Sony Corporation
    OriginalFilename : HotKeyServ.EXE

    #:14 [QTTASK.EXE]
    FilePath : C:\WINDOWS\SYSTEM\
    ProcessID : 4294625193
    Threads : 2
    Priority : Normal
    FileVersion : 6.5.1
    ProductVersion : QuickTime 6.5.1
    ProductName : QuickTime
    CompanyName : Apple Computer, Inc.
    InternalName : QuickTime Task
    LegalCopyright : © Apple Computer, Inc. 2001-2004
    OriginalFilename : QTTask.exe

    #:15 [TEATIMER.EXE]
    FilePath : C:\PROGRAM FILES\SPYBOT - SEARCH & DESTROY\
    ProcessID : 4294928113
    Threads : 3
    Priority : Idle
    FileVersion : 1, 4, 0, 2
    ProductVersion : 1, 4, 0, 3
    ProductName : Spybot - Search & Destroy
    CompanyName : Safer Networking Limited
    FileDescription : System settings protector
    InternalName : TeaTimer
    LegalCopyright : © 2000-2005 Patrick M. Kolla / Safer Networking Limited. Alle Rechte vorbehalten.
    LegalTrademarks : "Spybot" und "Spybot - Search & Destroy" sind registrierte Warenzeichen.
    OriginalFilename : TeaTimer.exe
    Comments : Schützt Systemeinstellungen vor ungewollten Änderungen.

    #:16 [WMIEXE.EXE]
    FilePath : C:\WINDOWS\SYSTEM\
    ProcessID : 4294770405
    Threads : 3
    Priority : Normal
    FileVersion : 5.00.1755.1
    ProductVersion : 5.00.1755.1
    ProductName : Microsoft(R) Windows NT(R) Operating System
    CompanyName : Microsoft Corporation
    FileDescription : WMI service exe housing
    InternalName : wmiexe
    LegalCopyright : Copyright (C) Microsoft Corp. 1981-1998
    OriginalFilename : wmiexe.exe

    #:17 [NOTEPAD.EXE]
    FilePath : C:\WINDOWS\
    ProcessID : 4294671849
    Threads : 1
    Priority : Normal
    FileVersion : 4.10.1998
    ProductVersion : 4.10.1998
    ProductName : Microsoft(R) Windows(R) Operating System
    CompanyName : Microsoft Corporation
    FileDescription : Windows Notepad application file
    InternalName : Notepad
    LegalCopyright : Copyright (C) Microsoft Corp. 1991-1998
    OriginalFilename : NOTEPAD.EXE

    #:18 [DDHELP.EXE]
    FilePath : C:\WINDOWS\SYSTEM\
    ProcessID : 4294400581
    Threads : 2
    Priority : Realtime
    FileVersion : 4.07.00.0700
    ProductVersion : 4.07.00.0700
    ProductName : Microsoft® DirectX for Windows® 95 and 98
    CompanyName : Microsoft Corporation
    FileDescription : Microsoft DirectX Helper
    InternalName : DDHelp.exe
    LegalCopyright : Copyright © Microsoft Corp. 1994-1999
    OriginalFilename : DDHelp.exe

    #:19 [AD-AWARE.EXE]
    FilePath : C:\PROGRAM FILES\LAVASOFT\AD-AWARE SE PERSONAL\
    ProcessID : 4294680793
    Threads : 3
    Priority : Normal
    FileVersion : 6.2.0.236
    ProductVersion : SE 106
    ProductName : Lavasoft Ad-Aware SE
    CompanyName : Lavasoft Sweden
    FileDescription : Ad-Aware SE Core application
    InternalName : Ad-Aware.exe
    LegalCopyright : Copyright © Lavasoft AB Sweden
    OriginalFilename : Ad-Aware.exe
    Comments : All Rights Reserved

    Memory scan result:
    »»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»
    New critical objects: 0
    Objects found so far: 27


    Started registry scan
    »»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»

    Registry Scan result:
    »»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»
    New critical objects: 0
    Objects found so far: 27


    Started deep registry scan
    »»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»
    Possible Browser Hijack attempt : .DEFAULT\Software\Microsoft\Internet Explorer\MainSearch Baraolsearch.aol.com

    Deep registry scan result:
    »»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»
    New critical objects: 0
    Objects found so far: 27


    Started Tracking Cookie scan
    »»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»


    Tracking Cookie Object Recognized!
    Type : IECache Entry
    Data : valued sony customer@real[1].txt
    TAC Rating : 3
    Category : Data Miner
    Comment :
    Value : C:\WINDOWS\Cookies\valued sony customer@real[1].txt

    Tracking Cookie Object Recognized!
    Type : IECache Entry
    Data : valued sony customer@c5.zedo[1].txt
    TAC Rating : 3
    Category : Data Miner
    Comment :
    Value : C:\WINDOWS\Cookies\valued sony customer@c5.zedo[1].txt

    Tracking Cookie Object Recognized!
    Type : IECache Entry
    Data : valued sony customer@apmebf[2].txt
    TAC Rating : 3
    Category : Data Miner
    Comment :
    Value : C:\WINDOWS\Cookies\valued sony customer@apmebf[2].txt

    Tracking Cookie Object Recognized!
    Type : IECache Entry
    Data : valued sony customer@ads.pointroll[2].txt
    TAC Rating : 3
    Category : Data Miner
    Comment :
    Value : C:\WINDOWS\Cookies\valued sony customer@ads.pointroll[2].txt

    Tracking Cookie Object Recognized!
    Type : IECache Entry
    Data : valued sony customer@~~local~~[1].txt
    TAC Rating : 3
    Category : Data Miner
    Comment :
    Value : C:\WINDOWS\Cookies\valued sony customer@~~local~~[1].txt

    Tracking cookie scan result:
    »»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»
    New critical objects: 5
    Objects found so far: 32



    Deep scanning and examining files (c
    »»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»

    Tracking Cookie Object Recognized!
    Type : IECache Entry
    Data : valued sony customer@real[1].txt
    TAC Rating : 3
    Category : Data Miner
    Comment :
    Value : c:\WINDOWS\Cookies\valued sony customer@real[1].txt

    Tracking Cookie Object Recognized!
    Type : IECache Entry
    Data : valued sony customer@c5.zedo[1].txt
    TAC Rating : 3
    Category : Data Miner
    Comment :
    Value : c:\WINDOWS\Cookies\valued sony customer@c5.zedo[1].txt

    Tracking Cookie Object Recognized!
    Type : IECache Entry
    Data : valued sony customer@apmebf[2].txt
    TAC Rating : 3
    Category : Data Miner
    Comment :
    Value : c:\WINDOWS\Cookies\valued sony customer@apmebf[2].txt

    Tracking Cookie Object Recognized!
    Type : IECache Entry
    Data : valued sony customer@ads.pointroll[2].txt
    TAC Rating : 3
    Category : Data Miner
    Comment :
    Value : c:\WINDOWS\Cookies\valued sony customer@ads.pointroll[2].txt

    Tracking Cookie Object Recognized!
    Type : IECache Entry
    Data : valued sony customer@~~local~~[1].txt
    TAC Rating : 3
    Category : Data Miner
    Comment :
    Value : c:\WINDOWS\Cookies\valued sony customer@~~local~~[1].txt

    Disk Scan Result for c:\
    »»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»
    New critical objects: 0
    Objects found so far: 37

    Possible Browser Hijack attempt Object Recognized!
    Type : File
    Data : Free AOL and Unlimited Internet.url
    TAC Rating : 3
    Category : Misc
    Comment : Problematic URL discovered: http://free.aol.com/tryaolfree/index.adp?167070
    Object : C:\WINDOWS\Favorites\



    Possible Browser Hijack attempt Object Recognized!
    Type : File
    Data : Go Faster.url
    TAC Rating : 3
    Category : Misc
    Comment : Problematic URL discovered: http://free.aol.com/aolbb/bb/index.adp?promo=375692
    Object : C:\WINDOWS\Favorites\



    Possible Browser Hijack attempt Object Recognized!
    Type : File
    Data : AOL Search.url
    TAC Rating : 3
    Category : Misc
    Comment : Problematic URL discovered: http://aolsearch.aol.com/
    Object : C:\WINDOWS\Favorites\Search\




    Performing conditional scans...
    »»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»

    Conditional scan result:
    »»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»
    New critical objects: 0
    Objects found so far: 40

    9:20:01 PM Scan Complete

    Summary Of This Scan
    »»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»
    Total scanning time:00:20:11.220
    Objects scanned:196488
    Objects identified:13
    Objects ignored:0
    New critical objects:13

  7. #7
    In Memoriam -Always in our heart pskelley's Avatar
    Join Date
    Oct 2005
    Location
    Clearwater, Florida
    Posts
    20,247

    Default

    Definitions of MRU on the Web:
    Most Recently Used (MRU) is a term in used in computing to refer to the list of programs or documents which were last accessed.
    These are benign, you can delete them or not, your call.

    I see nothing of malware in the information you provided and still need to see a HJT log.

    Try removing HJT from the computer, make sure you have a folder set up for it in the C:\HJT\ <<< like that, then download it again from here:
    http://www.merijn.org/files/HijackThis.exe
    Save the file into that folder you created and try again.

    Once you get that new HijackThis.exe, then open it and choose "Open the misc tools section" > Open the uninstall manager > Save list to the Desktop > Copy/paste the information in that notepad into this same topic.

    Then try again with the new HJT to see if you can generate a logfile. Make sure you are using "Do a system scan and save a logfile" Be patient, with Windows 98 if you have no 016 Downloaded Program Files (ActiveX) the 015 items would be the end of the logfile. Wait until a notepad opens and copy/paste that information to this topic.

    Thanks

  8. #8
    Junior Member
    Join Date
    Jul 2006
    Posts
    19

    Default Here is the program list.

    HJT keeps freezing. I will try it from safe mode.


    Adaptec UDF Reader
    Ad-Aware SE Personal
    Adobe Acrobat - Reader 6.0.2 Update
    Adobe Acrobat and Reader 6.0.3 Update
    Adobe Download Manager 1.2 (Remove Only)
    Adobe Reader 6.0.1
    Advanced MP3/WMA Recorder
    avast! Antivirus
    BatteryScope
    BUFFALO Client Manager2
    Client Manager
    DVDExpress
    DVgate
    DVgate Plug-in for Adobe(R) Premiere(R)
    EconoNet International's Simply Talker 2000
    HijackThis 1.99.1
    HotKey Utility
    Intel SpeedStep technology Applet
    J2SE Runtime Environment 5.0 Update 6
    Jog Dial Utility
    Kaspersky Online Scanner
    LiveUpdate
    Lyra System File Update Utility
    Macromedia Flash Player 8
    Media Bar 3.1.03
    Microsoft Internet Explorer 6 SP1 and Internet Tools
    Microsoft Office XP Media Content
    Microsoft Office XP Professional
    Microsoft Outlook Express 6
    Microsoft Text-to-Speech Engine 4.0 (English)
    Motion JPEG Software Decoder
    Mozilla Firefox (1.5.0.7)
    Panda ActiveScan
    PhotoPrinter 2000 Pro
    PowerPanel
    QuickTime
    RealPlayer
    RealProducer ActiveX Control
    RealProducer G2
    Rockwell HCF 56K Modem
    Smart Connect 3.0
    Smart Connect Monitor
    Smart Shared Library
    SmartCDRipper
    SnagIt 7
    Sony DV Shared Library
    Sony Notebook Setup
    SONY USB Mouse
    Sony Utilites DLL
    Spybot - Search & Destroy 1.4
    SpywareBlaster v3.5.1
    SpywareGuard v2.2
    System Files Update
    TextSound
    VAIO Wallpaper
    VB Runtime
    Viewpoint Media Player
    VisualFlow 1.0
    Windows Media Player system update (9 Series)
    WinZip
    YAMAHA DS-XG Driver

  9. #9
    In Memoriam -Always in our heart pskelley's Avatar
    Join Date
    Oct 2005
    Location
    Clearwater, Florida
    Posts
    20,247

    Default

    I see a program or two that are wasting valuable resources, like Viewpoint, but nothing that should be stopping HJT from running.

    When was the last time you reinstalled Windows 98? I suggest you run System File Checker in the event a file is missing or corrupt.

    http://support.microsoft.com/kb/185836/

    Make sure you have your Windows 98 CD handy.
    ________________________________________________

    Let's see if Spybot will help us a little. Open the program and click on MODE at the top. Check Advanced Mode. At the bottom left, choose Tools and then Process List.
    Choose Export and save it to your Desktop. Copy/Paste the information in that notepad to this same topic.

    Thanks
    Last edited by pskelley; 2006-09-17 at 01:45.

  10. #10
    Junior Member
    Join Date
    Jul 2006
    Posts
    19

    Default I got HJT to work!

    How do I save the log?

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •